• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 55
  • 12
  • 9
  • 6
  • 5
  • 5
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 128
  • 26
  • 24
  • 23
  • 21
  • 18
  • 18
  • 15
  • 14
  • 14
  • 14
  • 13
  • 12
  • 11
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

New doppler and modulation phenomena in CW pulsed oscillators

Somekh, M. G. January 1982 (has links)
No description available.
2

Tuning and noise performance of broadband voltage-controlled oscillators

Perkins, M. January 1988 (has links)
No description available.
3

On countermeasures of worm attacks over the Internet

Yu, Wei 15 May 2009 (has links)
Worm attacks have always been considered dangerous threats to the Internet since they can infect a large number of computers and consequently cause large-scale service disruptions and damage. Thus, research on modeling worm attacks, and defenses against them, have become vital to the field of computer and network security. This dissertation intends to systematically study two classes of countermeasures against worm attacks, known as traffic-based countermeasure and non-traffic based countermeasure. Traffic-based countermeasures are those whose means are limited to monitoring, collecting, and analyzing the traffic generated by worm attacks. Non-traffic based countermeasures do not have such limitations. For the traffic-based countermeasures, we first consider the worm attack that adopts feedback loop-control mechanisms which make its overall propagation traffic behavior similar to background non-worm traffic and circumvent the detection. We also develop a novel spectrumbased scheme to achieve highly effective detection performance against such attacks. We then consider worm attacks that perform probing traffic in a stealthy manner to obtain the location infrastructure of a defense system and introduce an information-theoretic based framework to obtain the limitations of such attacks and develop corresponding countermeasures. For the non-traffic based countermeasures, we first consider new unseen worm attacks and develop the countermeasure based on mining the dynamic signature of worm programs’ run-time execution. We then consider a generic worm attack that dynamically changes its propagation patterns and develops integrated countermeasures based on the attacker’s contradicted objectives. Lastly, we consider the real-world system setting with multiple incoming worm attacks that collaborate by sharing the history of their interactions with the defender and develop a generic countermeasure based on establishing the defender’s reputation of toughness in its repeated interactions with multiple incoming attackers to optimize the long-term defense performance. This dissertation research has broad impacts on Internet worm research since this work is fundamental, practical and extensible. Our developed framework can be used by researchers to understand key features of other forms of new worm attacks and develop countermeasures against them.
4

A novel alert correlation and confidence fusion framework in intrusion detection systems /

Yu, Dong, January 1900 (has links)
Thesis (Ph. D.)--University of Idaho, 2006. / Abstract. "May 2006." Includes bibliographical references (leaves 86-92). Also available online in PDF format.
5

Temporal, Spectral, and Spatial Treat Simulation Using a Towed Airborne Plume Simulator (TAPS)

Taylor, Rick, Redmond, Neal, Balding, Jeff 10 1900 (has links)
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada / Efforts are underway to develop Infrared countermeasure (IRCM) systems to defend aircraft against IR guided surface-to-air (SAM) and air-to-air (AAM) missiles. One such system is the Large Aircraft Infrared Counter Measure (LAIRCM) which employs temporal, spatial, and spectral missile warning techniques. There is no current technique however, for installed system flight testing of such countermeasures in a realistic temporal, spatial, and spectral environment. This paper is an introduction to the Towed Airborne Plume Simulator (TAPS), a system designed to address this test shortfall. The TAPS operational concept is described as well as techniques for simulating missile signatures.
6

An automatic-repeat-request protocol for mobile radio data transmission

Turnkey, P. F. January 1980 (has links)
No description available.
7

Investigation of low-noise microwave receivers based on the theoretical analysis of local oscillator noise contribution

Edgar, T. H. January 1980 (has links)
No description available.
8

Rule hashing for efficient packet classification in network intrusion detection

Yoshioka, Atsushi, January 2007 (has links) (PDF)
Thesis (M.S. in computer science)--Washington State University, December 2007. / Includes bibliographical references (p. 44-45).
9

Power Analysis of the Advanced Encryption Standard : Attacks and Countermeasures for 8-bit Microcontrollers

Fransson, Mattias January 2015 (has links)
The Advanced Encryption Standard is one of the most common encryption algorithms. It is highly resistant to mathematical and statistical attacks, however, this security is based on the assumption that an adversary cannot access the algorithm’s internal state during encryption or decryption. Power analysis is a type of side-channel analysis that exploit information leakage through the power consumption of physical realisations of cryptographic systems. Power analysis attacks capture intermediate results during AES execution, which combined with knowledge of the plaintext or the ciphertext can reveal key material. This thesis studies and compares simple power analysis, differential power analysis and template attacks using a cheap consumer oscilloscope against AES-128 implemented on an 8-bit microcontroller. Additionally, the shuffling and masking countermeasures are evaluated in terms of security and performance. The thesis also presents a practical approach to template building and device characterisation. The results show that attacking a naive implementation with differential power analysis requires little effort, both in preparation and computation time. Template attacks require the least amount of measurements but requires significant preparation. Simple power analysis by itself cannot break the key but proves helpful in simplifying the other attacks. It is found that shuffling significantly increases the number of traces required to break the key while masking forces the attacker to use higher-order techniques.
10

An investigation of simultaneous fade dynamics and radiometry in a 40 GHz satellite down link

Catalan, Carlos Catalan January 2000 (has links)
No description available.

Page generated in 0.0965 seconds